Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2010

Institution
Keyword
Publication

Articles 1 - 15 of 15

Full-Text Articles in Social and Behavioral Sciences

Dynamic Indexing, Viswada Sripathi Dec 2010

Dynamic Indexing, Viswada Sripathi

UNLV Theses, Dissertations, Professional Papers, and Capstones

In this thesis, we report on index constructions for large document collections to facilitate the task of search and retrieval. We first report on classical static index construction methods and their shortcomings. We then report on dynamic index construction techniques and their effectiveness.


Xpath-Based Template Language For Describing The Placement Of Metadata Within A Document, Vijay Kumar Musham Dec 2010

Xpath-Based Template Language For Describing The Placement Of Metadata Within A Document, Vijay Kumar Musham

Computer Science Theses & Dissertations

In the recent years, there has been a tremendous growth in Internet and online resources that had previously been restricted to paper archives. OCR (Optical Character Recognition) tools can be used for digitalizing an existing corpus and making it available online. A number of federal agencies, universities, laboratories, and companies are placing their collections online and making them searchable via metadata fields such as author, title, and publishing organization. Manually creating metadata for a large collection is an extremely time-consuming task, and is difficult to automate, particularly for collections consisting of documents with diverse layout and structure. The Extract project …


Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka Dec 2010

Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka

Masters Theses

The Old Stone Fort State Archaeological Park covers over 800 acres within Manchester, Tennessee, and is owned and managed by the Tennessee Division of State Parks. The central archaeological site within the park boundary is The Old Stone Fort mounds that enclose about 50 acres on a plateau above the convergence of the Big Duck and the Little Duck Rivers. The hilltop enclosure dates to the Middle Woodland Period, and radiocarbon dates obtained at the site range from the first to the fifth century A. D. Because of its size and apparent complexity, previous investigations of the site have been …


Cloud Storage And Online Bin Packing, Swathi Venigella Aug 2010

Cloud Storage And Online Bin Packing, Swathi Venigella

UNLV Theses, Dissertations, Professional Papers, and Capstones

Cloud storage is the service provided by some corporations (such as Mozy and Carbonite) to store and backup computer files. We study the problem of allocating memory of servers in a data center based on online requests for storage. Over-the-net data backup has become increasingly easy and cheap due to cloud storage. Given an online sequence of storage requests and a cost associated with serving the request by allocating space on a certain server one seeks to select the minimum number of servers as to minimize total cost. We use two different algorithms and propose a third algorithm; we show …


A Differential Absorption Model For Remote Sensing Of Atmospheric Pressure, Shivam J. Shah Jul 2010

A Differential Absorption Model For Remote Sensing Of Atmospheric Pressure, Shivam J. Shah

Electrical & Computer Engineering Theses & Dissertations

The goal of the project is to develop and test a "model based" radar processing strategy that is compatible with the concept of a "cognitive radar". The basic approach will be to develop a cognitive radar algorithm (genetic algorithm) based on the capabilities of an existing commercially available Software Radio. While the focus of this effort is the development of a candidate approach for genetic algorithm, the longer term goal would be to implement the approach using this software radio technology to provide a low cost radar processor. The proposed technology would use differential absorption radar working at the 50-56 …


A Comparative Study On Text Categorization, Aditya Chainulu Karamcheti May 2010

A Comparative Study On Text Categorization, Aditya Chainulu Karamcheti

UNLV Theses, Dissertations, Professional Papers, and Capstones

Automated text categorization is a supervised learning task, defined as assigning category labels to new documents based on likelihood suggested by a training set of labeled documents. Two examples of methodology for text categorizations are Naive Bayes and K-Nearest Neighbor.

In this thesis, we implement two categorization engines based on Naive Bayes and K-Nearest Neighbor methodology. We then compare the effectiveness of these two engines by calculating standard precision and recall for a collection of documents. We will further report on time efficiency of these two engines.


Enterprise Users And Web Search Behavior, April Ann Lewis May 2010

Enterprise Users And Web Search Behavior, April Ann Lewis

Masters Theses

This thesis describes analysis of user web query behavior associated with Oak Ridge National Laboratory’s (ORNL) Enterprise Search System (Hereafter, ORNL Intranet). The ORNL Intranet provides users a means to search all kinds of data stores for relevant business and research information using a single query. The Global Intranet Trends for 2010 Report suggests the biggest current obstacle for corporate intranets is “findability and Siloed content”. Intranets differ from internets in the way they create, control, and share content which can make it often difficult and sometimes impossible for users to find information. Stenmark (2006) first noted studies of corporate …


Software Internationalization: A Framework Validated Against Industry Requirements For Computer Science And Software Engineering Programs, John Huân Vũ Mar 2010

Software Internationalization: A Framework Validated Against Industry Requirements For Computer Science And Software Engineering Programs, John Huân Vũ

Master's Theses

View John Huân Vũ's thesis presentation at http://youtu.be/y3bzNmkTr-c.

In 2001, the ACM and IEEE Computing Curriculum stated that it was necessary to address "the need to develop implementation models that are international in scope and could be practiced in universities around the world." With increasing connectivity through the internet, the move towards a global economy and growing use of technology places software internationalization as a more important concern for developers. However, there has been a "clear shortage in terms of numbers of trained persons applying for entry-level positions" in this area. Eric Brechner, Director of Microsoft Development Training, suggested …


Modeling Geographic Awareness Of Road Networks For Consistency Verification, Ari Kassin Jan 2010

Modeling Geographic Awareness Of Road Networks For Consistency Verification, Ari Kassin

Open Access Theses & Dissertations

Problems related to transportation and inspection of valuable or sensitive assets such as commercial products and materials, cultural items and works of art, and hazardous materials share similarities and can be modeled by a core set of abstract entities including a payload, a vehicle, a driver, and an inspector. To make the load handling capabilities of security monitoring and inspection systems more scalable, security can be increased by reducing the variability of transportation routes to a finite set of authorized routes between trip origin and destination locations. Then trip anomalies, which are unexpected trip variations, can be used in inspection …


An Interoperable And Secure Architecture For Internet-Scale Decentralized Personal Communication, David Alan Bryan Jan 2010

An Interoperable And Secure Architecture For Internet-Scale Decentralized Personal Communication, David Alan Bryan

Dissertations, Theses, and Masters Projects

Interpersonal network communications, including Voice over IP (VoIP) and Instant Messaging (IM), are increasingly popular communications tools. However, systems to date have generally adopted a client-server model, requiring complex centralized infrastructure, or have not adhered to any VoIP or IM standard. Many deployment scenarios either require no central equipment, or due to unique properties of the deployment, are limited or rendered unattractive by central servers. to address these scenarios, we present a solution based on the Session Initiation Protocol (SIP) standard, utilizing a decentralized Peer-to-Peer (P2P) mechanism to distribute data. Our new approach, P2PSIP, enables users to communicate with minimal …


Toward A Theory-Based Natural Language Capability In Robots And Other Embodied Agents : Evaluating Hausser's Slim Theory And Database Semantics, Robin Kowalchuk Burk Jan 2010

Toward A Theory-Based Natural Language Capability In Robots And Other Embodied Agents : Evaluating Hausser's Slim Theory And Database Semantics, Robin Kowalchuk Burk

Legacy Theses & Dissertations (2009 - 2024)

Computational natural language understanding and generation have been a goal of artificial intelligence since McCarthy, Minsky, Rochester and Shannon first proposed to spend the summer of 1956 studying this and related problems. Although statistical approaches dominate current natural language applications, two current research trends bring renewed focus on this goal. The nascent field of artificial general intelligence (AGI) seeks to evolve intelligent agents whose multi-subagent architectures are motivated by neuroscience insights into the modular functional structure of the brain and by cognitive science insights into human learning processes. Rapid advances in cognitive robotics also entail multi-agent software architectures that attempt …


Website Accessibility Issues In Western Australian Public Libraries, Vivienne L. Conway Jan 2010

Website Accessibility Issues In Western Australian Public Libraries, Vivienne L. Conway

Theses : Honours

Website accessibility is a very real and pressing issue for public libraries internationally. Tim Berners-Lee credited with founding the Web, states "The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect." (Henry & McGee, 2010). There is wide-spread support for adherence to the Web Content Advisory Guidelines Version 1.0 and 2.0 (WCAG) throughout Federal, State and Local levels of government in Australia. The Guidelines have also been affirmed by the Australian Human Rights Commission, disability advocacy groups such as Vision Australia, and the Australian Library and Information Association. The Australian Government …


Eliciting User Requirements Using Appreciative Inquiry, Carol Kernitzki Gonzales Jan 2010

Eliciting User Requirements Using Appreciative Inquiry, Carol Kernitzki Gonzales

CGU Theses & Dissertations

Many software development projects fail because they do not meet the needs of users, are over-budget, and abandoned. To address this problem, the user requirements elicitation process was modified based on principles of Appreciative Inquiry. Appreciative Inquiry, commonly used in organizational development, aims to build organizations, processes, or systems based on success stories using a hopeful vision for an ideal future. Spanning five studies, Appreciative Inquiry was evaluated for its effectiveness with eliciting user requirements. In the first two cases, it was compared with traditional approaches with end-users and proxy-users. The third study was a quasi-experiment comparing the use of …


Building Efficient Wireless Infrastructures For Pervasive Computing Environments, Bo Sheng Jan 2010

Building Efficient Wireless Infrastructures For Pervasive Computing Environments, Bo Sheng

Dissertations, Theses, and Masters Projects

Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but networked with each other through wireless channels so that people can easily control and access them. In the architecture of pervasive computing systems, these small and networked computing devices form a wireless infrastructure layer to support various functionalities in the upper application layer.;In practical applications, the wireless infrastructure often plays a …


Modeling Decision Making Related To Incident Delays During Hurricane Evacuations, Robert Michael Robinson Jan 2010

Modeling Decision Making Related To Incident Delays During Hurricane Evacuations, Robert Michael Robinson

Computational Modeling & Simulation Engineering Theses & Dissertations

Successful evacuations from metropolitan areas require optimizing the transportation network, monitoring conditions, and adapting to changes. Evacuation plans seek to maximize the city's ability to evacuate traffic to flee the endangered region, but once an evacuation begins, real time events degrade even the best plans.

To better understand behavioral responses made during a hurricane evacuation, a survey of potential evacuees obtained data on demographics, driving characteristics, and the traffic information considered prior to and during an evacuation. Analysis showed significant levels of correlation between demographic factors (e.g., gender, age, social class, etc.) and self-assessed driver characteristics, but limited correlation with …